Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Trustwave Protects Your Databases in the Wake of Recent Healthcare Data Breaches

The recent cyberattack on Ascension Medical, Change Healthcare and several UK hospitals is a stark reminder of the vulnerabilities within the healthcare sector. The May 8, 2024, attack disrupted access to Electronic Health Records (EHR) for two weeks across Ascension's 140-hospital system, forced some hospitals to divert ambulances and rely on manual record-keeping, and has led to patient class-action lawsuits regarding potential data exposure.

Search & Spoof: Abuse of Windows Search to Redirect to Malware

Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware. We found the threat actors utilizing a sophisticated understanding of system vulnerabilities and user behaviors. Let’s break down the HTML and the Windows search code to better understand their roles in the attack chain.

Beyond Cyber Essentials: securing critical operations

The Cyber Essentials scheme has started to become a victim of its own success, with some organisations thinking it’s all they need to operate securely. Now I need to start by saying that Cyber Essentials is a great security baseline and I strongly recommend that every single organisation gets Cyber Essentials certification. It provides a valuable framework for establishing fundamental cyber security practices. But is that always enough?

Why API Discovery Is Critical to Security

For Star Trek fans, space may be the final frontier, but in security, discovering Application Programming Interfaces (APIs) could be the technology equivalent. In the iconic episode “The Trouble with Tribbles,” the legendary starship Enterprise discovers a space station that becomes overwhelmed by little fluffy, purring, rapidly reproducing creatures called “tribbles.” In a modern IT department, APIs can be viewed as the digital tribble overwhelming security teams.

Mastering UI Design with Flutter: Tips, Tricks, and Tools

You have probably heard about Flutter apps, high-performance cross-platform applications with a single code base. They are built on Flutter, an open-source UI SDK created by Google on Dart. Flutter UI is gaining popularity because it combines visual elements that users can see and engage with, like buttons, images, lists, navigation patterns, text fields, animations, and more. The ease of work, touch of creativity, simplicity of coding, and its numerous awesome tools make Flutter a popular choice in the development world. But how do you master UI design with Flutter?

Reasons & Solution for Outlook Error 500: Something Went Wrong

Outlook Error 500 is a common internal server error that basically affects the functioning of Outlook Web Access (OWA) and the web version of Outlook. The possible reasons for this error include server issues, oversized email attachments, browser issues, etc. In this guide, we will discuss possible reasons and solutions for 'Outlook Error 500: Something Went Wrong.'

Enhancing Language Models: An Introduction to Retrieval-Augmented Generation

Over the past few years, significant progress has been observed in the area of NLP, largely due to the availability and excellence of advanced language models, including OpenAI's GPT series. These models, which are useful for generating human-like text which is contextually appropriate, have transformed several interfaces from conversational agents to creative writing. However, as popular and effective as they may seem, the traditional language models have their own drawbacks and specifically, the restriction in accessing additional up-dated data and incorporating them.

Understanding and Configuring Spanning Tree Protocol (STP) on Cisco Catalyst Switches

Configuring the Spanning Tree Protocol (STP) on Cisco Catalyst switches is essential for maintaining a loop-free network topology and ensuring network stability. Below is a comprehensive guide to understanding and configuring STP on these switches.

Measuring the success of your SOAR: 5 criteria for enterprise security teams

As more and more organizations use automation and orchestration to streamline their security operations, defining clear success criteria becomes critical to ensure the effectiveness and scalability of their program. Recently, an enterprise prospect approached us seeking help on establishing success criteria for their upcoming journey with Tines workflow automation.